解决Nessus扫描的20007 - SSL Version 2 and 3 Protocol Detection高危漏洞

Posted

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了解决Nessus扫描的20007 - SSL Version 2 and 3 Protocol Detection高危漏洞相关的知识,希望对你有一定的参考价值。

参考技术A

【高危漏洞】

Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.

Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC\'s definition of \'strong cryptography\'.

See Also
https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568

Solution
Consult the application\'s documentation to disable SSL 2.0 and 3.0.
Use TLS 1.1 (with approved cipher suites) or higher instead.

Risk Factor
High

CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS Base Score
7.1 (CVSS2#AV:N/AC:M/Au:N/C:C/I:N/A:N)

Plugin Information:
Published: 2005/10/12, Modified: 2019/03/27

Plugin Output
tcp/389

【漏洞解决】
在OpenLDAP Server的配置文件slapd.conf中增加非安全协议的过滤

如下配置表示允许或不允许使用的协议,例如:!TLSv1.1表示不允许使用TLSv1.1,TLSv1.2表示允许使用。
那么这里的配置表示不允许使用TLSv1.1、SSLv2、SSLv3等协议,允许使用TLSv1.2协议。

nessus 本地扫描

第一次使用nessus ,so 适合小白看看

1.新建扫描、配置策略:起个名字,description是详细记录,类似于说明;targets是要访问的主机ip地址或者网段,必填项   选择好之后save

2.开始扫描

3、分析扫描结果

 

以上是关于解决Nessus扫描的20007 - SSL Version 2 and 3 Protocol Detection高危漏洞的主要内容,如果未能解决你的问题,请参考以下文章

Nessus漏洞扫描教程之配置Nessus

Nessus漏洞扫描教程之配置Nessus

Nessus 主机漏洞扫描器安装配置使用

Nessus 扫描web服务

使用Nessus进行漏洞扫描的过程

漏洞扫描 AWVS + Nessus (Docker版)